z13_train_wheel-2 z13_worker-2 z13_valve-2 z13_emergency_vehicle-2 z13_radar-2 z13_electric_tower-2
logo-psi

Product Source International Datacomm
Premier Distributor of DZS products

201.488.6000

linkedin

Certes

certes-5-pillars

DZS Imacs

imacs-8000-header

Bulk Fiber

z13_fiber_cable

GPON ONT

zhone fttx znid gpon 4201

Tibit

tibit-microplug-header

FTTx

fttx-znid-gpon-4111-front-med
HOME ->  Certes Network Security ->  Certes

MENU

DATASHEETS

 

SUPPORT

 

logo-psi

 

logo-dzs-1

 

logo-certes-blue-gray

 

logo-fonex

 

logo-loop-telecom

 

 

CERTES NETWORKS PROVABLE SECURITY®

logo-certes-blue-gray

Overview

Securing your critical data across the network

Certes’ approach to information assurance enables customers to secure data in transit in a way that is completely independent of the underlying network infrastructure.  Certes Layer-4 encryption solution decouples security from network hardware.  In this way, you and your team can be confident that your data is assured, regardless of what is going on in the network.

The Certes solution enables secure encryption of only the data (payload) enabling transparent deployment that operates independently with zero changes to routers, switches and firewalls. Network visibility and operational functionality are fully maintained with minimal complexity and minimal impact on latency.

This allows you to:

  1. Define intent-based policies for each category of data.

    Policies can be defined to encrypt sensitive data such as GDPR but allow public-facing traffic to pass in the clear. Policies can also be created to drop traffic entirely if desired in an automated manner.
     
  2. Segment your network by separating data flows, applications and work flows.

    By applying unique encryption keys to each data flow, you can logically segment your most sensitive data from everything else and prevent any risk of lateral movement in the event a bad actor accesses your network.
     
  3. Maintain network visibility while data in transit is being encrypted.

    While standard security products blind networks and make negatively impact network analytic tools, Certes Layer 4 solutions protect sensitive data while ensuring that network visibility is maintained
     
  4. Prove that Security Policies are working with Observability.
    Our solutions can help you prove that your security policies are being enforced and their security strategy is working with Certes Observability tool.


    If a security policy is not being enforced for some reason or if suspicious behavior is going on, your teams can identify this early on. Our Observability tool integrates with all of your existing SIEM and AI tools allowing you to automatically drop traffic if certain circumstances exist. This also enables you to produce very granular reports to your insurers and other auditors to give them certain assurances without creating hours/days of work for your team.

 

Certes-CEP420-front-hires
Certes-CEP420-front-hires
logo-psi

We sell and support
DZS products and solutions

Please contact PSI at
 201.488.6000
for a quote

HOME | SOLUTIONS | SUPPORT | CONTACT US | Terms and Conditions of Sale

All logos, brand, product, service, and process names are trademarks or service marks of their respective holders and are protected by U.S. and international copyright laws and treaty provisions. All trademarks and registered trademarks are the sole property of their respective holders. All photographs are courtesy of respective manufacturers. All specifications, products, product names, schedules, content and prices are subject to change without notice. No warranty is made as to technical accuracy. No warranty is made with respect to the merchantability of any product, service or solution or the fitness of any product, service or solution for any particular purpose or use. Nothing contained herein shall be construed as conferring any license or right under any copyright, trademark, patent or other intellectual property rights. 240105-1908





 

z13_tornado-1a

video

Manufacturers